Which VMware product can virtualize user desktops so that the desktops reside as virtual machines in the data center?
A. VMware Horizon View
B. VMware vRealize Log Insight
C. VMware Mirage
D. VMware Workspace
Why is VMware NSX the most secure environment against threats and vulnerabilities?
A. Does not require high-end security protocols due to trie isolated arrangements or virtual machines.
B. Offers a threat-free network because each virtual machine is managed by customized security policies.
C. Offers no risk from unrelated streams of data communicating with each other.
D. Handles threats efficiently through the use of alerts and notifications, before any honzontal impact is created to the adjacent virtual machine
Which logical networking service does NSX Edge use to change source of destination IP addresses and TCP/UDP port numbers that are found in the flow of a packet header?
A. Load balancing
B. Dynamic Host Configuration Protocol (DHCP)
C. Network Address Translation (NAT)
D. VPN
An administrator wants to provide seamless connectivity between on-premises and hybrid cloud resources. In this scenario which technologies can be incorporated to provide seamless connectivity? (Choose two.)
A. VMwareNSXL2VPN
B. VMwareNSXL4-L7VPN
C. Site to Site VPN with TLS
D. Site to site VPN with IPSec
An administrator decides to implement logical switching to establish connectivity between virtual machines that reside on the same host Which layer is used by logical switching to provide this connectivity?
A. Layer 4
B. Layer 5
C. Layer 3
D. Layer 2
What is the common practice that I followed when a new application is deployed in legacy networking?
A. The application is mapped to users upfront.
B. The physical network is updated by the network team each time.
C. Recourse allocation is reconfigured based on the application requirement.
D. Firewall and Intrusion Prevention System (IPS) solutions are switched off during the first deployment cycle.
How does Software-Defined Data Center (SDDC) facilitate easy provisioning and management of the underlying physical resources?
A. Organizes physical resources into logical pools.
B. Calculate the number of users.
C. Organizes physical resources into clusters
D. Uses predetermined policies and rules.
A security policy is a collection of security services of firewall rules, or both. Which security service is applied to virtual machines to ensure data security?
A. Virtual machine
B. Guest Introspection
C. Network Introspection
D. SpoofGuard
An administrator has deployed Distributed Firewall to protect their infrastructure from security threats. Due to extreme loads on the network the CPU is saturated and the memory becomes full.
In this scenario, which mode does the Distributed Firewall enter?
A. Secondary
B. Fail open
C. Proxy
D. Fail close
Which characteristic of VMware NSX enables secure intra-data center network traffic1?
A. Micro-segmentation
B. Cloud pod architecture
C. Elasticity
D. Multi-tenant manageability